SME, Inc.

  • Home
  • About Us
  • Services
    • Cloud Solutions
    • Compliance Solutions
      • ALTA Best Practices
      • CMMC
      • DFARS
      • HIPAA
      • PCI DSS
      • Security Awareness Training
    • Data Center Services
      • Hosting
      • Monitoring
      • Hands & Eyes
    • Managed Security Services
      • Asset Management
      • Nextwall™ Managed Firewall
      • IDS/IPS
      • Managed Anti-Virus
      • VPN/Remote Access
      • Vulnerability Assessment Services
        • External Vulnerability Assessment
        • Internal Vulnerability Assessment
        • Web Application Testing
    • Technical Support
      • The SME Tech
      • Backups
      • Remote Support
  • Blog
  • Contact Us

November 16, 2020 By SME, Inc.

New CMMC Interim Rule

It should come as no surprise that things have changed again. Many of you have already heard about the roll out of the Cybersecurity Maturity Model Certification (CMMC) over the next 5 years and hopefully have started working towards the required level of certification for your organization. But have you heard about the CMMC Interim Rule? 

The CMMC Interim Rule includes a new DoD methodology for NIST 800-171 starting November 30, 2020. The Interim Rule adds DFARS 252.204-7019 and 252.204-7020 and allows for a scoring methodology (Basic, Medium, High). This new methodology requires all DoD contractors and sub-contractors to complete a NIST 800-171 self-assessment and receive a score through the Supplier Performance Risk System (SPRS). 

A Basis Assessment is a self-assessment completed by the contractor, while the Medium and High Assessments are to be completed by the Government. The Government will select contractors for Medium or High review based on the nature of the program.

Please note all self-assessments completed by contractors are given a Basic score, in order to achieve a Medium or High score the assessment must be reviewed by the government. 

Contracting Officers are required to verify the offeror has a current NIST  800-171 DoD Assessment on record prior to contract aware or the exercise of an option.

Certain aspects of the interim rule may change with the issuance of a final rule and additional guidance. Until then, DoD contractors should make plans to implement the new Assessment requirement quickly, and should carefully review all DoD solicitations and contract modifications to understand whether or not the new rule impacts them.

What does this mean for you? It is time for you dust off your POAM and SSP, create an account with SPRS, and go through the self-assessment process.

To find out more about our CMMC auditing services, or any other IT/security related questions, please give us a call at 703-378-4110 or email info@smeinc.net.

Filed Under: Uncategorized

November 4, 2020 By SME, Inc.

Vulnerability Assessment

What is a Vulnerability Assessment?

A vulnerability assessment is a systematic process intended to assist in the identification, classification, and prioritization of risks, potential threats, and vulnerabilities in computer systems, networks, hardware, applications, and other parts of your I.T. infrastructure. Vulnerability assessments are essential in order to locate the systems that may be susceptible to any known vulnerabilities, assign severity levels to those vulnerabilities, and then recommends possible remediation or mitigation techniques.

Types of vulnerability Assessments

There are several different types of vulnerability assessments that can be performed in order to strengthen your IT systems and infrastructure:

  • Host based Assessment – used in order to identify vulnerabilities in servers, workstations and other networked hosts. This type of scan offers greater visibility into the configuration settings and patch history of the canned systems.
  • Network and Wireless Assessment – identifies polices and practices to prevent unauthorized access to private or public networks, and networked resources.
  • Database Assessment – database and big data systems are evaluated for weak points, misconfigurations, identifying insecure dev or test environments, and classifying sensitive data across an organizations IT systems and infrastructure in order to prevent malicious attacks.
  • Application Assessment – used to identify security vulnerabilities and misconfigurations in software, and web application front-ends source code.

Threats that can be prevented by vulnerability assessment

Some examples of the types of threats that can be mitigated by a vulnerability assessment:

  • Code Injection Attacks (SQL Injection, XSS attacks)
  • Insecure, faulty authentication mechanisms
  • Possible privilege escalation
  • Factory defaults, most software and hardware ships with insecure default settings, such as admin passwords that are easily discoverable online.

2019 saw the highest number of Ransomware attacks ever, according to the Emsisoft report. The ransomware attacks at least 966 government agencies, educational establishments and healthcare providers. To be more specific:
– 113 state and municipal governments and agencies
– 764 healthcare providers
– 89 universities, colleges and school districts.
This means that up to 1,233 individual schools were affected.

Source: https://www.cpomagazine.com/cyber-security/ransomware-costs-in-2019/

Do I need a vulnerability assessment?

Ransomware, data breaches, phishing, covid-19 scams, as technology changes, so do the tactics, techniques, and procedures of the hackers. The threat landscape is constantly changing along with the pace of technology itself. The threats and risks of 2019 may not be the same ones we’ve seen thus far in 2020, or the ones we will see in the upcoming year.

With more than 5 billion records compromised in 2019, breaches cost US organizations more than $1.2 trillion

Source: https://www.techrepublic.com/article/data-breaches-cost-us-companies-more-than-1-2-trillion-lastyear/#:~:text=With%20more%20than%205%20billion,organizations%20more%20than%20%241.2%20trillion. 20more%20than%205%20billion,organizations%20more%20than%20%241.2%20trillion
  • Average ransomware fees paid out in 2019 was $111,605; with 205,280 organization being affected by ransomware in 2019.
  • Increased risks, threats, vulnerabilities, and exploits and being discovered and targeted by hackers every day.
  • Without an assessment, IT Management, and stakeholders are left guessing as to how to best spend budgeted resources. IT budgets are limited, knowing which assets to protect ensures that focus can be put on protecting the most business-critical systems.
  • Many government contractors are required to have a vulnerability assessment done in order to stay within compliance of government regulation.

How often do I need a vulnerability assessment?

Many are under the impression that a vulnerability assessment should be done annually, however a vulnerability assessment is only a snapshot of that specific time period and leaves the next 365 days until the next vulnerability assessment without any knowledge of new vulnerabilities that may exist internally or externally.

The threat landscape is continuously changing, with new treats appearing almost daily. Continuous vulnerability assessments are crucial in order to fully keep systems as secure as possible.

Here at SME, we provide all types of comprehensive vulnerability assessments, and vulnerability management depending on your needs. These assessments range from annual, quarterly, monthly, and continuous vulnerability management. Our services can be tailored to your needs, or budget!

To find out more about our vulnerability assessment and vulnerability management services, or any other IT/security related questions, please give us a call at 703-378-4110 or email info@smeinc.net.

Filed Under: Uncategorized

October 28, 2020 By SME, Inc.

Working Securely from Home

As we have all been faced with challenges during the COVID-19 pandemic, the way we do business has changed dramatically, with many of us working from home. This has presented hackers with new tactics, and opportunities to cast a wider net on their attacks. IT security has always been important, and during these times that importance is even greater. 

In an ideal world, most companies would have some form of plan or policy on how to securely make the transition from employees working on-site to working from home. Unfortunately, many of us made the transition with little to no time to plan. Now that the dust has settled a bit, although the future is still uncertain when and if we will go back to doing business the way we used to, it is a good time to confirm that employees working remotely are doing so as securely as possible.

Tips on working securely from home


Acceptable Use

Employees should follow the same policies and procedures as if they were working in the office.

Only use company set up email, messaging, storage, etc when doing work for the company.

Home Office

If possible, have a private area set up to work. This space should send a clear signal to you that it’s time to focus. To avoid burnout, try to stay away from your workspace when you’re not working, unless absolutely necessary.

Secure Remote Connection

Connection to the office should only be made using a secure VPN (Virtual Private Network).

Password Security

Passwords used should be unique and no less than 12 characters on all devices being used, the longer the better.

End-Point Protection and Patching

Employees using a personal computer/laptop should make sure there is up to date anti-virus software installed and the operating system is up to date with updates/patches, including 3rd party software, downloaded and installed on regular basis.

Wi-Fi Security

If using a wireless connection, make sure the connection is encrypted and the wireless password is strong.

Confirm that the login and password for the router (usually provided by the ISP, Internet Service Provider) has been changed. Most personal routers still have the default login and password which is not only weak, but also known across the Internet and easily searchable online.

User Awareness

Lock your computer/laptop screen when you walk away or are finished working.

Stay vigilant when it comes to phishing emails.  Phishing emails are up 667% and according to Google 81 million phishing emails containing malware are being sent each day. Verify, Verify, verify before providing personal information or doing a financial transaction.

Notify your IT company IMMEDIATELY if you possibly clicked on or downloaded something suspicious.  The quicker they can run mitigation the better.

As many of you are aware hacking is big business costing many businesses a ton of money. 

Many hackers are employed just like we are. They are given quotas to meet, deadlines, and are expected to perform in order to keep their job.

Let’s make it hard for them to stay employed! 

SME is here to assist in any way that we can.  If you have any questions about working securely from home or any other IT/security related questions, please give us a call at 703-378-4110 or email info@smeinc.net.

Stay Safe, Healthy, and Sane!

Filed Under: Uncategorized

October 21, 2020 By SME, Inc.

Simple Steps to Securing Yourself Online

Use a Security Application

This can be in the form of an antivirus, anti-malware, or firewall application. These applications come in both free and paid versions. This can be a confusing process but by looking at reviews and comparing these tools to find the right one for your specific needs. Some companies will even include all of these tools in one standalone application.

Don’t Click on Just Anything

Be cognizant of what it is that you are trying to access online. Many of the attacks we see and hear about in the news started off with someone clicking on a link they thought was legit but was in reality a malicious link or email attachment that unknowingly installed software.

Learning what the tell-tale signs of phishing sites and malicious URL’s is a very valuable skill for every online user to have. Instead of immediately clicking on the link, ask yourself, “Am I expecting this email from so-and-so? Did I sign up for this?”. Another trick we call can do is to hover over the link (not clicking it) and see if the URL is taking you to a legit website, or if the URL is a confusingly long and obfuscated, seemingly random string of characters; if so then you can probably guess that it is not something you want to click on.

Also, to cover our previous point of using security applications, there are some anti-malware and applications that offer real-time scanning and browser protection that warns or advises users that the link or website they are attempting to visit may contain malicious content. These tools can further protect you from downloading ransomware, adware, or trojan horses from infecting your device.

The Password is Strong with This One

123456, password, iloveyou

Recognize any of those? If so then they may just be one of your passwords, and if they are then you may want to check and see if you’ve been pwnded. Not all hackers are like the ones you see in the movies, they don’t’ all wear black hoodies, slam back energy drinks, or listen to techno music while they take down the Gibson. However, all hackers LOVE easy to guess passwords! One of the most common entry points for cyber-attacks is a weak password that you are using to try and secure your online account.

Here is a short list of the 30 most commonly used passwords of 2020

Using one password decently strong for every account is a dangerous game to play with your online security, using one weak password for your accounts, you may as well just leave the door wide open. Point of this? Use strong passwords! Strong passwords can be difficult to remember, sure. However, there are smart people who have thought of this already and offer solutions for us. Password managers like LastPass and BitWarden both offer free and premium solutions for not only generating extremely strong passwords, but storing them for you as well, better yet, they even offer plugins that will auto-inject these passwords into your online accounts so you don’t have to copy and paste them yourself. Another, easier to remember solution is to use passphrases instead of passwords. Using multiple words strung together to create a phrase adds variation to the password, this way you can still remember multiple passwords easily and are still getting strong passwords that protects your accounts.

Filed Under: Uncategorized

October 15, 2020 By SME, Inc.

Happy Cybersecurity Awareness Month! … So what is it?

History

Since its inception in 2004 Cybersecurity Awareness Month has had one main goal: making Americans safer and more secure online. Launched as a collaborative effort by the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA) C.A.M strives to increase the importance of cybersecurity across our Nation, attempting to ensure that as many Americans have the resources needed in order to practice their own cyber hygiene at home, or in a corporate environment.

Now, 16 years later Cybersecurity Awareness Month has grown into somewhat of a grassroots campaign, with massive efforts being led by the participation of many large companies in the industry, as well as government agencies all in an attempt to engage their customers, employees, college campuses, and the general public with the idea that every digital user should have some idea of how to be safe and secure while using the Internet.

169 million personal records from financial, business, education, healthcare, and public sectors were exposed in 2015

If You Connect It, Protect It

In order to keep yourself safe online, any device that you are using in order to access content from the Internet needs to be protected. This can be as simple as keeping the device up to date with the current software updates available, knowing exactly what it is that you are trying to access online, or ensuring that you are using strong password for every online account.

In order to understand how important Cybersecurity Awareness is, you must first understand that you are a target, you have something that online criminals want, whether it be personal/private information in the form of your date of birth, your mother’s maiden name, or even your healthcare records and credit/debit card information. Threat actors will attempt to use this data in order to try and steal something from you or break into your accounts.

Filed Under: Uncategorized

June 22, 2017 By SME, Inc.

Phishing

Phishing scams continue to plague businesses.  We receive many calls and emails from customers who continue to receive these malicious emails.

Attackers are targeting employees and getting more sophisticated in their tactics.  Attackers are counting on businesses not having layers of security in place.  Attackers are counting on businesses not having policies and procedures and if they do employees are not following them. Attackers are counting on employees not being properly trained on how to spot a phishing email.  Your best line of defense is to have layers of security in place, implement specific policies and procedures, train your employees, have an ongoing security awareness training program, and communicate your expectations.  Educate and empower your employees, everyone is part of the security team.

SME is here!  We can assist you with implementing layers of security, writing your policies and procedures, training your employees, and building an ongoing security awareness training program combined with phishing simulations that assists in driving behavior change to further protect your business.

SME has multiple solutions that can increase the security posture of your business.  If you have any questions or for more information give us a call for a free consultation.

Filed Under: Uncategorized

May 15, 2017 By Webmaster

WannaCry

A crushing strain of ransomware, WannaCry, has been unleashed on the world with reports of over 150 countries impacted in a very short time.
SME’s fully managed security solutions will help protect you from these types of attacks.  SME has been researching this threat and testing systems.  If SME is already providing fully managed security solutions for your business you may already have multiple solutions in place that prevent this type off attack.  Please give us a call if you have any questions or are concerned about your security posture.

Filed Under: Uncategorized

August 15, 2016 By SME, Inc.

Defcon 24

Defcon 24 was amazing once again this year.  SME shared and gained knowledge with the global infosec community.  We are even more prepared to help defend your business.

One of the most amazing things we witnessed was the DARPA Cyber Grand Challenge, no telling what the future holds.

Check it Out!

https://www.cybergrandchallenge.com/

 

Filed Under: Uncategorized

July 29, 2016 By SME, Inc.

SME helps meet your compliance needs with Amazon Web Services

AWS is the first cloud service provider to successfully complete the assessment against the newly released PCI Data Security Standard (PCI DSS) version 3.2, 18 months in advance of the mandatory February 1, 2018, deadline.

http://blogs.aws.amazon.com/security/post/Tx20SIO4LU1XDFA/AWS-Becomes-First-Cloud-Service-Provider-to-Adopt-New-PCI-DSS-3-2

 

Filed Under: Uncategorized

  • « Previous Page
  • 1
  • …
  • 3
  • 4
  • 5

Contact Us

    Your Name

    Your Email

    Subject

    Your Message

    Recent Post

    Government contractors play a critical role in supporting various agencies and handling sensitive information. To … More »

    What Our Clients Say

    "SME handles all of our internet hosting needs, providing a reliable, high-performance, secure and cost-effective platform for us to host web-based systems for biotech companies. We have been consistently impressed with the responsive, knowledgeable and professional service we receive."

    Simply Making IT Easier!TM
    Local: 703-378-4110
    Toll Free: 855-2-SMEINC
    Email: info [at] smeinc.net

    Copyright © 2023 · Systems Management Enterprises, Inc. · Privacy Policy · Terms of Service